1. Unix access control is discretionary in nature. Unix has a few mechanisms to restrict the set of permissions
for a process (chroot, special principal nobody). Suppose a program is downloaded from the Internet.
a. How can UNIX use these mechanisms to restrict this program from performing the operations listed below
b. Give clear and concrete examples of situations where these operations are necessary?
c. Is there a mechanism other that discretionary to enable these operations for genuine programs downloaded from the Internet?
Your solution should be general so that it applies to all programs that share the same attribute i.e., downloaded from the Internet.
a. Open a network socket to a remote server and upload certain files to that server
b. Encrypt certain files on the disk
c. Act as a proxy for all password protected websites, i.e., send the user's credentials to the website on his/her behalf
Recently Asked Questions
- flowchart using Flowgorithm and Pseudocode for the following Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text
- whenever when I loop the same order of times separately like for example. I will order 5 eggs and then make another individual order of eggs the calculator
- what is loop invariant ?